Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 02:14

General

  • Target

    3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe

  • Size

    420KB

  • MD5

    7b432411c12d3d0d31ecaf9011450e42

  • SHA1

    968943d42ba1e8938989b6ed1884195c2285396f

  • SHA256

    3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348

  • SHA512

    6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b

  • SSDEEP

    6144:lfBwgfV+aXoGJR1xpppStlxu4qGilNZZDLxFLWj4+36o9:l3V+anFxZUq1NZJ9N8qu

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
    "C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 744
      2⤵
      • Program crash
      PID:1552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 804
      2⤵
      • Program crash
      PID:2340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 860
      2⤵
      • Program crash
      PID:4768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 924
      2⤵
      • Program crash
      PID:2728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 944
      2⤵
      • Program crash
      PID:996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 980
      2⤵
      • Program crash
      PID:3664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1136
      2⤵
      • Program crash
      PID:1192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1144
      2⤵
      • Program crash
      PID:1372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1144
      2⤵
      • Program crash
      PID:2820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1068
      2⤵
      • Program crash
      PID:4024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1612
      2⤵
      • Program crash
      PID:2980
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 552
        3⤵
        • Program crash
        PID:812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 572
        3⤵
        • Program crash
        PID:2152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 596
        3⤵
        • Program crash
        PID:3456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 620
        3⤵
        • Program crash
        PID:4400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 884
        3⤵
        • Program crash
        PID:3928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 588
        3⤵
        • Program crash
        PID:2744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 904
        3⤵
        • Program crash
        PID:2988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 924
        3⤵
        • Program crash
        PID:3704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 952
        3⤵
        • Program crash
        PID:3296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1012
        3⤵
        • Program crash
        PID:3468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1156
        3⤵
        • Program crash
        PID:1704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1016
        3⤵
        • Program crash
        PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1196
        3⤵
        • Program crash
        PID:848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1592
        3⤵
        • Program crash
        PID:2756
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:1048
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3468
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1288
          3⤵
          • Program crash
          PID:1968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1584
          3⤵
          • Program crash
          PID:1392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1140
          3⤵
          • Program crash
          PID:4368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1012
          3⤵
          • Program crash
          PID:116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 880
        2⤵
        • Program crash
        PID:1940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 1336
        2⤵
        • Program crash
        PID:3888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4360 -ip 4360
      1⤵
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4360 -ip 4360
        1⤵
          PID:3312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4360 -ip 4360
          1⤵
            PID:4500
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4360 -ip 4360
            1⤵
              PID:1384
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4360 -ip 4360
              1⤵
                PID:5052
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4360 -ip 4360
                1⤵
                  PID:1748
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4360 -ip 4360
                  1⤵
                    PID:1908
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4360 -ip 4360
                    1⤵
                      PID:4820
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4360 -ip 4360
                      1⤵
                        PID:4372
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4360 -ip 4360
                        1⤵
                          PID:2876
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4360 -ip 4360
                          1⤵
                            PID:3144
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4360 -ip 4360
                            1⤵
                              PID:2352
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4360 -ip 4360
                              1⤵
                                PID:3008
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2936 -ip 2936
                                1⤵
                                  PID:2780
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2936 -ip 2936
                                  1⤵
                                    PID:4496
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2936 -ip 2936
                                    1⤵
                                      PID:4624
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2936 -ip 2936
                                      1⤵
                                        PID:628
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2936 -ip 2936
                                        1⤵
                                          PID:4336
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2936 -ip 2936
                                          1⤵
                                            PID:3564
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2936 -ip 2936
                                            1⤵
                                              PID:3932
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2936 -ip 2936
                                              1⤵
                                                PID:1996
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2936 -ip 2936
                                                1⤵
                                                  PID:2276
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2936 -ip 2936
                                                  1⤵
                                                    PID:4136
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2936 -ip 2936
                                                    1⤵
                                                      PID:4984
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2936 -ip 2936
                                                      1⤵
                                                        PID:3316
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2936 -ip 2936
                                                        1⤵
                                                          PID:1516
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2936 -ip 2936
                                                          1⤵
                                                            PID:4248
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2936 -ip 2936
                                                            1⤵
                                                              PID:116
                                                            • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                              C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:2004
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 440
                                                                2⤵
                                                                • Program crash
                                                                PID:3604
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2004 -ip 2004
                                                              1⤵
                                                                PID:3756
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2936 -ip 2936
                                                                1⤵
                                                                  PID:924
                                                                • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:692
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 448
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:696
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 692 -ip 692
                                                                  1⤵
                                                                    PID:2440
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2936 -ip 2936
                                                                    1⤵
                                                                      PID:2280
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2936 -ip 2936
                                                                      1⤵
                                                                        PID:4564

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                        Filesize

                                                                        420KB

                                                                        MD5

                                                                        7b432411c12d3d0d31ecaf9011450e42

                                                                        SHA1

                                                                        968943d42ba1e8938989b6ed1884195c2285396f

                                                                        SHA256

                                                                        3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348

                                                                        SHA512

                                                                        6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b

                                                                      • C:\Users\Admin\AppData\Local\Temp\757987694264

                                                                        Filesize

                                                                        79KB

                                                                        MD5

                                                                        c9bf398343176880b5b65b4e66b81cb8

                                                                        SHA1

                                                                        93adaf9b72cafae17b4f965aa1f4d2b80cba7329

                                                                        SHA256

                                                                        8f260e350dc8e03dc16700f3a3fda17307f31c89814518fc994d3d32d186f7b6

                                                                        SHA512

                                                                        11c01b4318062400a2690e9589ddcccf583d937080ed14a049e2a5e66c0202c161ac3997a4aab6ba9ac83d71a547fac2f78de12cb916bc4e234ca8e710a10884

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rvexe2kx.a0a.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                        Filesize

                                                                        109KB

                                                                        MD5

                                                                        ca684dc5ebed4381701a39f1cc3a0fb2

                                                                        SHA1

                                                                        8c4a375aa583bd1c705597a7f45fd18934276770

                                                                        SHA256

                                                                        b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                        SHA512

                                                                        8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                                      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                        Filesize

                                                                        1.2MB

                                                                        MD5

                                                                        4876ee75ce2712147c41ff1277cd2d30

                                                                        SHA1

                                                                        3733dc92318f0c6b92cb201e49151686281acda6

                                                                        SHA256

                                                                        bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                                        SHA512

                                                                        9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                                      • memory/692-93-0x0000000000C00000-0x0000000000D00000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/692-95-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/692-94-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2004-84-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2004-82-0x0000000000C30000-0x0000000000D30000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/2004-83-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2936-34-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2936-67-0x0000000000C80000-0x0000000000D80000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/2936-85-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2936-23-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/2936-22-0x0000000002620000-0x000000000268F000-memory.dmp

                                                                        Filesize

                                                                        444KB

                                                                      • memory/2936-21-0x0000000000C80000-0x0000000000D80000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/2936-68-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/3468-56-0x00007FFCA3A20000-0x00007FFCA44E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3468-66-0x00007FFCA3A20000-0x00007FFCA44E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3468-60-0x0000023BF9590000-0x0000023BF959A000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/3468-59-0x0000023BF9740000-0x0000023BF9752000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/3468-58-0x0000023BF9150000-0x0000023BF9160000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/3468-57-0x0000023BF9150000-0x0000023BF9160000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/3468-46-0x0000023BF9120000-0x0000023BF9142000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/4360-1-0x0000000000E40000-0x0000000000F40000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/4360-24-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/4360-3-0x0000000000400000-0x0000000000B12000-memory.dmp

                                                                        Filesize

                                                                        7.1MB

                                                                      • memory/4360-2-0x00000000028E0000-0x000000000294F000-memory.dmp

                                                                        Filesize

                                                                        444KB